AppSec metrics fail, Mend.io’s Risk Reduction Dashboard fixes it
Today, we’re introducing our Risk Reduction Dashboard. This is a new way for security leaders to quantify their AppSec...
Today, we’re introducing our Risk Reduction Dashboard. This is a new way for security leaders to quantify their AppSec...
Every developer knows the scenario: you're deep in flow, building features, when a security team ticket with a critical...
In this episode, we discuss the newly released OWASP Top 10 for 2025. Join hosts Tom Eston, Scott Wright,...
The way software is built is being rewritten in real-time. Large language model (LLM) integration, agents and model context protocol (MCP) connection turn a simple app...
Application Security Testing (AST) services use automated tools and manual techniques to find and fix security vulnerabilities in software,...
When Twilio announced its acquisition of Stytch yesterday (on October 30, 2025), it sent ripples through the developer community....
Hey there, With Halloween around the corner, what’s scarier for organizations than vulnerabilities in their web applications? And it's...
How trending are mobile apps? Statistics say that mobile apps are now a part of 70% of the digital...
Showstopper bugs with security certificates—plus failing USB keyboards and mice—cause QA questions.Microsoft’s Windows security update rollup is badly buggy this...
Introduction: The Rising Importance of Proactive Security Okay, so, proactive security – it's kinda a big deal now, right? I...
Global sales SVP at Qualys Shawn O’Brien kicked off the company’s Qualys ROCon 2025 event this week in Houston, Texas....
Researchers discover a new way to steal secrets from Android apps.Anything any Android app can display is vulnerable to the Pixnapping...
CVSS 10.0 vulnerability in ubiquitous cloud storage layer. PATCH NOW.Redis (Remote Dictionary Server) and its open source fork Valkey share a...
The software security landscape is evolving faster than ever, and AI is accelerating this change. As generative and embedded AI...
Hardware, API and network vulnerabilities have soared in the last year, according to new research by Bugcrowd. And not surprisingly,...